Sciweavers

IFSA
2007
Springer
159views Fuzzy Logic» more  IFSA 2007»
14 years 5 months ago
Counting Finite Residuated Lattices
We study finite residuated lattices with up to 11 elements. We present an algorithm for generating all non-isomorphic finite residuated lattices with a given number of elements. ...
Radim Belohlávek, Vilém Vychodil
IFSA
2007
Springer
149views Fuzzy Logic» more  IFSA 2007»
14 years 5 months ago
From Interval Computations to Constraint-Related Set Computations: Towards Faster Estimation of Statistics and ODEs Under Interv
One of the important components of granular computing is interval computations. In interval computations, at each intermediate stage of the computation, we have intervals of possi...
Martine Ceberio, Vladik Kreinovich, Andrzej Pownuk...
IFSA
2007
Springer
133views Fuzzy Logic» more  IFSA 2007»
14 years 5 months ago
Fuzzy Tree Mining: Go Soft on Your Nodes
Tree mining consists in discovering the frequent subtrees from a forest of trees. This problem has many application areas. For instance, a huge volume of data available from the In...
Federico Del Razo López, Anne Laurent, Pasc...
IFSA
2007
Springer
102views Fuzzy Logic» more  IFSA 2007»
14 years 5 months ago
Strict Generalization in Multilayered Perceptron Networks
Typically the response of a multilayered perceptron (MLP) network on points which are far away from the boundary of its training data is not very reliable. When test data points ar...
Debrup Chakraborty, Nikhil R. Pal
HOLOMAS
2007
Springer
14 years 5 months ago
From Intelligent Agents to Intelligent Beings
Paul Valckenaers, Karuna Hadeli, Bart Saint Germai...
HOLOMAS
2007
Springer
14 years 5 months ago
Holonic Simulation of a Design System for Performance Analysis
Richard Sohnius, Eyck Jentzsch, Wolf-Ekkehard Matz...
HOLOMAS
2007
Springer
14 years 5 months ago
Ontology-Based Competence Management for Team Configuration
Vladimir Tarassov, Thomas Albertsen, Alexey Kashev...
HOLOMAS
2007
Springer
14 years 5 months ago
Flexible Roles in a Holonic Multi-Agent System
Emmanuel Adam, René Mandiau
HOLOMAS
2007
Springer
14 years 5 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...